ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
With the development of the Internet of Things (IoT), a more humanity-related network called the Social Internet of Things (SIoT) is now evolving. WSNs are also part of the Social Internet of Things (SIoT), a new application of the Internet of Things (IoT). Considering the characteristics of sensor nodes, including limited resource, limited communication capability, and an uncontrollable environment, location privacy protection is a challenging problem for WSNs. In this paper, we propose a source location protection protocol based on dynamic routing to address the source location privacy problem. We introduce a dynamic routing scheme that aims at maximizing paths for data transmission. The proposed scheme first randomly chooses an initial node from the boundary of the network. Every package will travel a greedy route and a subsequent directed route before reaching the sink. Theoretical and experimental results show that our scheme can preserve source location privacy and defeat various privacy disclosure attacks (eavesdropping attack, hopby-hop trace back attack, and direction-oriented attack) without affecting the network lifetime.
6. Conclusions and future research direction
Here, we proposed a source location protection protocol based on dynamic routing (SLPDR) to address the source location privacy problem. Packet forwarding is triggered by a boundary node, and then a dummy packet is transmitted through GR. In the proposed scheme, packages on the backbone will experience a greedy route and a subsequent directed route. Additionally, we also take full use of the redundant energy in outer regions to generate cyclic routes on several rings to confuse the adversary. Through this mechanism, the real source is hidden, and we can achieve a significant enhancement in network security without sacrificing the lifetime of the network. MATLAB simulation showed that SLPDR outperforms the existing protocols.
Despite the fact that SLPDR can provide strong SLP, a more capable attack model has yet to be considered. During the exploration of future source location protection algorithms, attention should be given to a more powerful adversary (such as global attackers or more cautious attackers). Future work will include greater exploitation of the utility of surplus energy outside the hotspot area and the development of a more effective protocol to protect the source location.